Securing Real-Time Mobile Communications. Delivering secure mobile access to the cloud. A white paper from Mitel

Size: px
Start display at page:

Download "Securing Real-Time Mobile Communications. Delivering secure mobile access to the cloud. A white paper from Mitel"

Transcription

1 Securing Real-Time Mobile Communications Delivering secure mobile access to the cloud A white paper from Mitel

2 The workplace itself is changing with employees becoming more mobile and increasingly more distributed. The on-ramp to the Internet is primarily via a smartphone and not a personal computer. Increasingly, people everywhere would rather communicate and collaborate by text, , social platforms or workstream real-time communications applications. As a result of these dynamics, basic real-time communications and connectivity services delivered by operators are under pressure to evolve as the market demands richer, higher value services available on any device, across any network, at any time. With many options to improve communications and collaboration delivered over LTE networks and the Internet, security and policy enforcement have become an even more critical piece of the equation. For many businesses, best-effort security simply is not sufficient and cannot be an afterthought. As smartphones have changed over time to essentially become mobile computing platforms, these devices are subject to equally evolving security threats. With operators moving the service infrastructure to the cloud, organizations increasingly are concerned about traffic separation and privacy. Few offers in the open market sufficiently satisfy the ever-changing business and functional requirements while also maximizing security, protection, and affordability. Market Dynamics Multiple dynamics are at play in the domain of mobile business communications. While there is a shift in communication modalities, there hasn t yet been a widespread replacement or substitution of one for another. Rather, new styles and means of communicating and collaborating augment and complement the traditional modes of business voice and . Increasingly, the networks that mobile operators build and enable today are and will be done in the cloud. Tier 1 mobile operators today already offer high value real-time communications services across virtualized infrastructure. The move to the cloud and network functions virtualization (NFV)-based architectures presents additional challenges with traffic separation, multi-tenancy, security, privacy, and service orchestration, activation, and management. Primary market dynamics include: 1. The rise of mobile communications as the dominant and preferred medium; 2. The growth (and diversity) of non-voice real-time communications options 1 ; 3. The increased adoption of bring-your-own-device (BYOD) policies in the business environment; 4. Desire by users to have services that coordinate across multiple devices (e.g., smartphone, tablet, and computer); 5. Pressure to maximize business productivity and the use of personally downloaded applications leaking into the business environment are ahead of IT departments setting appropriate policies and procedures; 6. Increased availability and use of Wi-Fi as a primary transport option for services (including Wi-Fi calling and messaging) when in the workplace, at home, and when roaming; 7. A move to services delivered via the cloud by both businesses and mobile network operators; and 8. Security threats becoming more varied and sophisticated. Mobile devices are increasingly subject to hacks and attacks. 1. For example, messaging and workstream collaboration and communication. 2 Mitel

3 Challenges and Problem Statement Businesses (and the mobile operators that serve them) need to balance dynamic, unpredictable, and often insecure communications methods with security and control. Business managers desire a framework that gives workers full measure of maximizing productivity and efficiency, but need a solution that guarantees end-to-end security across insecure, unregulated and unlicensed environments. Optimally, the solution to the problem is delivered as a software solution without investment in specialized hardware products, supports remote authorization, management, and monitoring, uses standard security protocols and procedures (where practical), accommodates bring-your-owndevice policies, and can be procured via either CapEx or OpEx models. Market Response and Competitive Landscape To date, securing real-time communications at best happens between the end device and the near edge of the mobile network. Once the service request traverses the network boundary into the network core, there s no guarantee to what degree the connecting segments are secured across each segment of the internal network infrastructure 2. A growing number of over-the-top apps 3 find traction with user communities that have a greater awareness of security issues. Peer-to-peer communication via the burgeoning WebRTC technology requires the media to be encrypted. However, these options are typically offered with closed communities, delivered using nonstandard approaches, with no interworking or federation, and are delivered to market by the app provider. Solution Description Mitel presents MiStealth, an offer enabled by Unisys, that delivers valuable, contemporary real-time communications services that are secured end-to-end. Mobile network operators (MNOs) and mobile virtual network operators (MVNOs) bring the solution to market with the primary target segment being organizations that desire a high degree of security for their complete mobile service package. As an example solution enabled by MiStealth, Mitel integrates IMS-based mobile infrastructure solution enabling VoLTE, VoWiFi, and advanced messaging with MiStealth. 2. The 3GPP has specified security requirements for service infrastructure, but not all are fully implemented or deployed. Also, the specifications are available for anyone to consume. 3. Jitsi (recently acquired by Atlassian), Heml.is, RedFone, Secret, Signal, SilentCircle, TextSecure, and Wickr. Mitel 3

4 Real-Time Communications from Mitel The VoLTE/VoWiFi solution by Mitel includes the IMS core (IMC), which interacts with the application voice and messaging application servers, authentication entity, home subscriber service (HSS), and circuitswitched (CS) network via the media gateway control function (MGCF). This is the core component of the IMS solution and all the IMS application servers interact with it as per 3GPP specifications 4. Mitel s IMS solution includes the complete suite of core networking functions as described below. Interrogating Call Session Control Function (I-CSCF): Performs location and routing functions by interrogating the HSS for location and registration information. Serving Call Session Control Function (S-CSCF): Performs session control, feature/service control, registrar service, resource allocation and routing functions. Converged Telephony Application Server (CTAS): Mitel s CTAS is an IR.92/IR.94 compliant application server that provides voice and video services over LTE. Mitel s TAS has been uniquely designed with many standard features found on a GSM/ UMTS MSC such that Mitel s VoLTE/Wi-Fi calling solution provides 100% service parity with the legacy network. Breakout Gateway Control Function (BGCF): Selects the network to which legacy (circuit-switch PSTN) breakout is to occur and provides routing information. Session Border Controller (SBC): Mitel s SBC is used for wireless access from Wi-Fi networks, where mobility is not required or supported (otherwise, Wi-Fi calling-enabled devices connect to the epdg). It also supports VoLTE with esr-vcc functions. Based on a flexible and modular architecture with separately scalable control and media planes, Mitel s SBC functionality is delivered as part of the universal access gateway (UAG). In addition, the UAG provides standard functions like media anchoring, transcoding, media transfer, firewall, and access control functionality. This is the first point of contact for a VoWiFi capable handset into the IMS network. For seamless mobility, the UAG can also host the epdg function. Evolved Packet Data Gateway (epdg): The epdg is used for untrusted Wi- Fi access networks providing secure IPSEC/IKEv2 tunneling and EAP based authentication mechanisms enhancement of the Wi-Fi calling service with seamless mobility by introducing the epdg as part of the EPC network. VoLTE/VoWiFi-enabled devices traverse the epdg to securely connect to the network and seamlessly move between Wi-Fi and LTE access networks without dropping an active voice or video call. Media Resource Function (MRF): The MRF is used in conjunction with the CTAS to provide announcements. It interacts with CTAS on the control plane and interacts with UAG for the media plane. The MRF also provides the media functions required for voice and video conferencing services, as well as other more complex media transcoding for more advanced services. Rich Messaging Service (RMS): Mitel s RMS is the next generation IP messaging platform that can support SMS over IMS functions or OMA CPIM interworking to legacy SMS/MMS. The RMS interconnects with SMSC and proxies SMS messages to/from the mobile subscriber when registered in IMS. The RMS is an IMS application server element which offers SMS services over IP for all VoWiFi subscribers when under Wi-Fi coverage and connects the VoWiFi subscribers to the legacy SMSC to deliver and receive SMS messages. Application Gateway (AG): Mitel s AG performs the security gateway function for HTTP-based traffic from the public Internet to the operator s trusted network, which is needed for authenticating and authorizing HTTP traffic when using the Wi-Fi calling service. A typical use case of AG involvement is user-changing supplementary services over 3GPP Ut interface. The AG authorizes the request and enables supplementary service management over Wi-Fi access. Packet Data Network Gateway (PGW): The PGW does the bearer handing (S2b Interface with the epdg). The PGW also handles the IP mobility anchoring between LTE and Wi-Fi access. It can be optionally combined with the access SBC in an optimized converged architecture. Mobile Client: The Mitel VoWiFi mobile client complies to 3GPP and IETF standards as well as the applicable portions of GSMA IR.92. The client is downloaded on the handset and interacts with the handset components to latch on a Wi-Fi connection and register with the Mitel application servers. Once registered, the Mitel VoWiFi client works seamlessly to offer voice call and messaging services over IP to the end user. Client Configuration and Provisioning Server (CCPS): The CCPS automates provisioning and configuration based on the RCS auto-configuration architecture. This is based on the client performing HTTP requests to a dedicated server that manages configuration data and interacts with customer s IT and network platforms to authenticate and control client behavior. Provisioning Gateway (PG): The PG provides CS service parity and synchronization of a VoWiFi subscriber s configuration upon initial subscription. Ongoing service updates are also supported in the access domain from which the updates were originated. This includes changes applied via the backend provisioning system. The PG operation is seamless to the end user. IMS Home Subscriber Service (IMS-HSS): The IMS-HSS provides the home subscriber service as per IMS 3GPP standard and offers a 3GPP standard interface to the IMS core and application servers for subscriber profile exchange and other functions Voic Application Server (VM AS) and mstore: The VM AS together with mstore provides the voic deposit and notification functions in the solution when subscriber is not reachable, busy or not logged in, etc. 4. The IMS core is interchangeably referred to as CSCF. 4 Mitel

5 MiStealth Security The MiStealth solution integrates with the Mitel portfolio for operators and enterprises. MiStealth is a security architectural framework which: 1. Enables IP network segmentation based on user identity. 2. Provides the ability for network endpoints to go dark to be essentially undetectable except to authorized users. 3. Secures data in motion via AES-256 encryption based on ephemeral keys with Perfect Forward Secrecy. 4. Reduces reliance on physical infrastructure for security, allowing consolidation of physical networks and cost reduction. 5. Quickly responds to changing business needs by allowing network access privileges to be controlled through commonly used identity management systems such as Microsoft Active Directory. Each COI has an associated cryptographic key, and each network endpoint receives its COI keys dynamically by presenting user credentials to a MiStealth Authorization Service. The Authorization Service uses an identity management system to authenticate user credentials, and to determine which COI each user is authorized to receive. Secure Community of Interest Protocol (SCIP): The SCIP allows two endpoints to determine if they share a COI, without requiring either endpoint to reveal its COI. SCIP also allows two endpoints to derive an ephemeral shared secret that is then used by the Internet Key Exchange (IKE) protocol to establish an IPsec tunnel between the endpoints. In addition, SCIP allows two endpoints to agree on the most secure cryptographic profile they both support. Endpoints protected by MiStealth are dark. An endpoint will not accept or transmit any unencrypted packets unless it is specifically configured to do so. Similarly, an endpoint will not respond to SCIP negotiation from another endpoint, unless the two endpoints have a common COI. Secure Communities of Interest (COI): In a network secured by MiStealth, endpoints generally cannot communicate unless the users on those endpoints are members of the same COI. Each COI typically is associated with a group of users that has been defined in an identity management system. In this way, a flat network is segmented dynamically into virtual networks, where connectivity or visibility within each virtual network is determined by user and group definitions in the identity management system. Little or no changes are required to the underlying network gear. Further, no changes are required to applications that run within this framework. MiStealth automatically protects endpoints and their network traffic, using COIs and filters to limit allowed traffic based on user-specific and role-specific policies. The entire MiStealth framework is centrally managed, supporting enterprise-wide license pooling. As part of the management system, enhanced monitoring and control of endpoints is supported. Mitel 5

6 The MiStealth solution is comprised of the following key elements: Enterprise Manager (EM): A centrallymanaged, distributed set of component services allow administrators to create and manage various MiStealth objects such as COIs, filters, and roles; to provision and monitor geographically dispersed EM components; and to authorize, monitor, and license MiStealth users. EM components can be deployed in a high-availability configuration. Enterprise Management Portal (EM Portal) is the administrators user interface. It is composed of a series of portlets that administrators use to configure and manage the MiStealth environment. Enterprise Management Core (EM Core) contains the database of MiStealth objects and their attributes. It also hosts the business logic that implements the functions presented in EM Portal, and is an audit repository for all of the MiStealthrelated events within the enterprise. Authorization Service (AuthSvc) distributes COIs and filters to endpoints based on user identity. It also serves as the licensing, logging, and control point for active endpoints. Each endpoint is provisioned with an ordered list of AuthSvcs, and proceeds sequentially through the list until receiving COIs. License Service (LicSvc) maintains a pool of licenses of different types (e.g., server, workstation, mobile), and distributes them to AuthSvcs ondemand. A central pool of licenses can be shared across the entire enterprise, and can dynamically follow the sun as demand shifts across geographies. Monitor Service (MonSvc) interconnects the central and distributed EM components. EM can be deployed either as a full set of all five of these components or as a distributed subset containing an AuthSvc, LicSvc, and MonSvc. One of the full, five-component deployments must be installed somewhere in the enterprise. This full deployment is referred to as an Enterprise Management Server (EMSvr). Subordinate three-component deployments (AuthSvc, LicSvc, and MonSvc), referred to as Authorization Servers (AuthSvrs) can also be deployed throughout the enterprise for redundancy or locality. EM components can be installed on Windows Server 2008 R2 or 2012 R2. EM is distributed as a single image (.iso), which can be installed on either a standalone or virtualized server. EM generates installation packages that are used to install the MiStealth agent on endpoints. Packages are tailored according to the endpoint operating system, the ordered list of AuthSvcs the endpoint should use, and other parameters. Endpoints: Each MiStealth-enabled endpoint has a MiStealth agent. The agent is responsible for communicating with AuthSvcs to authorize users and obtain COIs, claim a license, and log MiStealth-related events. The agent also manipulates the native OS packet filters to remain dark on the network, to perform SCIP negotiation, to establish IPsec tunnels, and to allow or deny specific traffic flows. Endpoint installation packages can be distributed with common software distribution tools, such as Microsoft SCCM, and can be installed silently with no user intervention. MiStealth Secure Virtual Gateway (SSVG): Operating systems for which there is no native MiStealth agent available can participate in MiStealth networks through the use of a SSVG. The SSVG is placed topologically in front of the systems to be protected, with as small a clear-text segment between those systems and the SSVG as possible. Within the SSVG, each protected system is configured with user credentials. The user credentials determine, through the normal MiStealth authorization method, which COI is given to the protected system. Multiple clear-text systems can be protected by one SSVG, each system with its own unique user credentials. The SSVG is packaged as a Linux system image that can be installed on a dedicated physical server, or as a VM in a virtualized environment. Secure Remote Access Gateway (SRA- GW): Systems, devices, or specific mobile applications that need to participate in a MiStealth-protected intranet, but are outside the intranet, can connect through a SRA-GW. As with the SSVG, each remote endpoint is represented as a unique MiStealth endpoint within the intranet. With SRA- GW, unlike SSVG, users are dynamically authenticated instead of being statically configured, and the connection from the remote endpoint to the SRA-GW is a highly secured IPsec VPN tunnel. Remote endpoints can be systems or devices with native IPsec VPN capabilities, or mobile applications that have been wrapped using Mocana MAP. SRA-GW requires an additional component, the IPsec VPN Gateway (VPN-GW), to terminate IPsec tunnels from remote endpoints. The MiStealth Security Gateway from Mitel serves the role of VPN-GW. 6 Mitel

7 MiStealth Benefits Secure Communities of Interest: MiStealth achieves network segmentation dynamically through the use of SCIP, IKE, and IPsec to implement secure communities of interest based on user identity. Endpoints are dark to unauthorized traffic. Software Solution: No hardware appliances are required to deploy a MiStealth-enabled environment. All components are delivered as software and are suitable for executing in virtualized environments or on dedicated server hardware provided by the enterprise or operator. Enterprise Licensing: MiStealth licenses can be pooled for an entire enterprise, with licenses floating to wherever they are required on-demand. Leverage Identity Management Systems: MiStealth enables network access to be managed based on groups defined in commonly used identity management systems such as Microsoft Active Directory. Standard Security Methods and Protocols: Internet Key Exchange (IKE) and IPSec are the underlying key exchange, tunnel establishment and data transfer protocols. The use of these standard protocols improves the performance of endpoints, allows for wider OS platform support, and facilitates wider adoption. Centralized Management: All MiStealth objects, such as COIs, roles, authorization services, and endpoint installation packages are centrally defined, provisioned, and maintained through a web-based portal which can be located anywhere in the network. No Changes to Applications or User Procedures: MiStealth functions automatically and does not require any changes to application code. The MiStealth agent obtains COI keys automatically when a user logs on. Holistic View of Entire Secure Real-Time Mobile Communications Solution Legend Signaling Bearer Air Link SRVCC/ICS ISBC IBCF ENUM HLR BGCF Mj MGCF Authorization Server HTTP SRA VDR Gateway Controller Unisys Stealth Radius VPN Gateway 2G/3G Access R4 Core MSC MGCF SIP IMS-MGW MAP TrGW VoLTE IWF SRVCC HSS Mw/Mj/Mg Cx I-CSCF Mi Mg Mn IMS-MGW S1-MME S1-U enb MME X11 S5/s8 SGW PGW Gx PGW SGI Rx Rx ATCF/ ATGW/ IBCF/ I-SBC/ E-CSCF P-CSCF UAG (Unified Access Gateway) Mw Mw Mx HSS Cx BGCF/SRE Mw S-CSCF Mj LI X1/X2 HSS ENUM Sh TAS SCC-AS Mitel Mobile Ma SC/Mr 2 ENUM ISC ISC ISC AGW Ut Mr 2 CAP DNS Rf SNMP SGI PS RLS IP SM GW (IMP) RMS (RCS) Mp MSC/MGCF MGW MRFP SCP DNS CDF OSS ATGW Rich Message Server (RMS) Mitel 7

8 Solution Differentiation The Mitel solution is unique in the market from the perspective of functionality and value proposition. End-to-End Security Mobile solutions delivered by MNOs typically provide security from the endpoint to the edge of the network core. In an IMS context, the P-CSCF maintains the security association between the endpoint and the network core. However, once inside the core, there is no guarantee how and to what degree traffic is secured. The MiStealth solution provides security along the entire network path from endpoint to endpoint. Portability The solution offers a framework for an enterprise or organization to establish and implement security policies that are associated with a user rather than a device. Roaming Users that travel outside of the operator s coverage area benefit from the solution s ability to provide end-to-end security from the mobile application though all of the segments the service traverses. Beyond Real-Time Communications Should an enterprise or organization wish to encompass a broader set of mobile applications (e.g., , CRM, ERP), the MNO/MVNO can extend the solution scope and provide added value to the solution. Make the Smart Choice Businesses and organizations need to be savvy when they make decisions relating to real-time communications. They must make the best choice in accommodating their workforce s desired communications methods while also ensuring security. Mobile operators need to respond and address the security component of this new wave of services and respond to growing threat of mobile-targeted security breaches. Mobile network operators are also motivated to improve ARPU and to craft truly differentiated offers. The MiStealth real-time communications solution from Mitel delivers on all points. Contact us today to learn more. mitel.com Copyright 2016, Mitel Networks Corporation. All Rights Reserved. The Mitel word and logo are trademarks of Mitel Networks Corporation. Any reference to third party trademarks are for reference only and Mitel makes no representation of ownership of these marks.

Sh Gy. Ro Gx. Cx Ici. Mr Mj

Sh Gy. Ro Gx. Cx Ici. Mr Mj Sh Ro Cx Ici SIP UT IMS Sv LTE Mr Mj Mi Mg ISC Mw LTE / VoLTE IMS Protocols Interfaces LTE Protocol Stack IMS Protocol Stack LTE (4G) IMS PSTN / LTE Ex : S1, S5, SGi LTE Control Plane Ex : S1, S10, S11,

More information

WIT VoWiFi. Leverage Wi-Fi for voice calling. vowifi.wit-software.com

WIT VoWiFi. Leverage Wi-Fi for voice calling. vowifi.wit-software.com WIT VoWiFi Leverage Wi-Fi for voice calling vowifi.wit-software.com Operators Challenges Low market penetration of Android devices supporting Wi-Fi Calling natively. Network coverage solutions for in-building

More information

MAVENIR AND WIND RIVER

MAVENIR AND WIND RIVER AN INTEL COMPANY MAVENIR AND WIND RIVER Mavenir Collaborates with Wind River to Accelerate Deployment of NFV Solutions Mavenir and Wind River have partnered to perform testing and validation processes

More information

Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience

Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience Steve Northridge Email: Steve.Northridge@Oracle.com Twitter: @stevenorthridge 3 Photo Source: Boston Public Library

More information

Cisco Converged Services Platform

Cisco Converged Services Platform Data Sheet Cisco Converged Services Platform Mobile subscribers are demanding the same type of services that are provided over the Internet on their mobile phones including messaging, social networking,

More information

IMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES

IMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES Daitan White Paper IMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES Highly Reliable Software Development Services http://www.daitangroup.com Daitan Group 2014 IMS, NFV

More information

Overview and Status of NGN Standardization Activities. Naotaka Morita Vice Chairman of SG13, ITU-T NTT Service Integration Laboratories

Overview and Status of NGN Standardization Activities. Naotaka Morita Vice Chairman of SG13, ITU-T NTT Service Integration Laboratories Overview and Status of NGN Standardization Activities Naotaka Morita Vice Chairman of SG13, ITU-T NTT Service Integration Laboratories Contents 1. Outline of NGN 2. Key Technologies of NGN 3. Summary and

More information

IMS Migrations IMS Enabling Common Network Convergence. Michael Coward CTO and Co-founder

IMS Migrations IMS Enabling Common Network Convergence. Michael Coward CTO and Co-founder IMS Migrations IMS Enabling Common Network Convergence Michael Coward CTO and Co-founder Introduction New wave of telecom infrastructure $4B IMS New generation of Fixed/Mobile Convergence 3G-LTE Equipment

More information

Voice over Long Term Evolution Migration Strategies

Voice over Long Term Evolution Migration Strategies White Paper Voice over Long Term Evolution Migration Strategies What You Will Learn The evolution of mobile networks to the Voice over Long Term Evolution (VoLTE) all-ip technology standard has generated

More information

VoLTE is the mainstream solution

VoLTE is the mainstream solution Expert's Forum Top 10 E2E VoLTE considerations By Wang Yachen VoLTE is unprecedented in its complexity and a great challenge to carrier networks and telco business transformation. This article details

More information

Brochure. Dialogic BorderNet Session Border Controller Solutions

Brochure. Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Solutions Supercharge Connections between Networks, Services and Subscribers with Ease and Scale The BorderNet family of session

More information

Wi-Fi Calling Overview

Wi-Fi Calling Overview Wi-Fi Calling Overview Opportunities and challenges towards 5G v1 Agenda 1. About WBA 2. WBA Work Item - Wi-Fi Calling 3. Broaden Wi-Fi Calling Support 4. Technology Options 5. Wi-Fi Calling and Path towards

More information

The View From Service Layer

The View From Service Layer Interworking SDP RCS MMTel and More The View From Service Layer Ravishankar G Shiroor 25-Nov-2010 Sophia Antipolis - France Agenda Challenges in front of the Service Layer IMS and Service Layer Complementing

More information

Development of IPX: Myth or Reality?

Development of IPX: Myth or Reality? Development of IPX: Myth or Reality? Patrick MeLampy -CTO/Founder Acme Packet Acme Packet 1 Agenda IPX Acme Packet Perspective IPX and LTE/VoLTE Acme Packet Acme Packet Page 2 IPX A Vendor Perspective

More information

Alepo, an expert in carrier-class WiFi, offers solutions to bring WiFi calling to the market, regardless of existing network type or business model.

Alepo, an expert in carrier-class WiFi, offers solutions to bring WiFi calling to the market, regardless of existing network type or business model. Solution Brief WiFi Calling Introduction WiFi calling, or voice over WiFi (VoWiFi), offers an exciting new opportunity for mobile network operators (MNOs) to introduce carrier-class WiFi services that

More information

Delivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一

Delivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一 Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS 2. Third Party Voice over IP 3. The IP Multimedia Subsystem 4. Circuit Switched Fallback 5. VoLGA LTE was designed as a data

More information

i-mcs Italtel IMS & VoLTE solution 1/ Italtel S.p.A. All rights reserved

i-mcs Italtel IMS & VoLTE solution 1/ Italtel S.p.A. All rights reserved i-mcs Italtel IMS & VoLTE solution 1/7 Introduction Telecommunication Market is nowadays stressed between the aggressive and fast on the market Over The Top (OTT) players that provides voice, video and

More information

8.4 IMS Network Architecture A Closer Look

8.4 IMS Network Architecture A Closer Look 8.4 IMS Network Architecture A Closer Look 243 The anchoring of the media in TrGW also has an implicit topology-hiding effect. Without anchoring, the SDP answer provided to the other network would contain

More information

Cisco Start. IT solutions designed to propel your business

Cisco Start. IT solutions designed to propel your business Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they

More information

Cisco Universal Wi-Fi Solution 7.0

Cisco Universal Wi-Fi Solution 7.0 Data Sheet Cisco Universal Wi-Fi Solution 7.0 Cisco Universal Wi-Fi 7.0 is a suite of carrier-grade Wi-Fi solutions which provides operators with Cisco validated solution architectures. These Architectures

More information

Pilsung AB Taegyun A Fathur AB Afif A Hari A Gary A Dhika AB April AB Mulya AB Yusuf AB Anin A Rizka B Dion AB Siska AB Mirel AB Hani AB Airita AB List of countries by number of Internet users 100,00%

More information

Real-Time Communications Witout Boundaries. Ribbon Policy Solutions

Real-Time Communications Witout Boundaries. Ribbon Policy Solutions Real-Time Communications Witout Boundaries Ribbon Policy Solutions As SIP session traffic continues to grow a trend accelerated by the rapid adoption of multimedia devices like smartphones and tablets

More information

SRVCC Ensuring voice service continuity in VoLTE/IMS

SRVCC Ensuring voice service continuity in VoLTE/IMS SRVCC Ensuring voice service continuity in VoLTE/IMS White Paper 2013 Author : Binu K G 1 Wireless service has turned a full circle and voice remains the most popular and killer application for any mobile

More information

Leverage SDN Principles in LTE to Meet Future Network Demands

Leverage SDN Principles in LTE to Meet Future Network Demands Leverage SDN Principles in LTE to Meet Future Network Demands PLATFORM FOR PROFITABLE GROWTH The Role of SDN in LTE Networks SDN refers to specific technologies considered promising for mobile network

More information

VoLTE: The Next Generation of Voice

VoLTE: The Next Generation of Voice VoLTE: The Next Generation of Voice Introduction Voice over LTE (VoLTE) is no longer just a buzz word in the telecom community but is quickly becoming reality, with implementations appearing around the

More information

Technical Convergence and Network Development

Technical Convergence and Network Development Technical Convergence and Network Development Thorsten Heins, Chief Technology Officer, Siemens Communications International Conference NGN and Emerging Markets Investment, Infrastructure and Innovation

More information

Signaling for the Internet of Things. Michael Senn Principal Technologist

Signaling for the Internet of Things. Michael Senn Principal Technologist Signaling for the Internet of Things Michael Senn Principal Technologist Internet of Things Examples The Connected Car Infotainment Predictive maintenance for manufactures Regular and on-demand data communication

More information

Cisco ASR 5000 Series Small Cell Gateway

Cisco ASR 5000 Series Small Cell Gateway Data Sheet Cisco ASR 5000 Series Small Cell Gateway Mobile subscribers want access to the network at home, work, hotspots, and everywhere in between. This requires mobile operators to expand their service

More information

CDMA Evolution Delivering Real-time & Multimedia Services

CDMA Evolution Delivering Real-time & Multimedia Services CDMA Evolution Delivering Real-time & Multimedia Services May 2006 3G CDMA Latin America Regional Conference, Brazil 2 Nortel Confidential Information Wireless Trends Access & Core Greater Market Penetration

More information

Timmins Training Consulting

Timmins Training Consulting VoLTE Core Network Course Outline Short Description VoLTE stands for voice over Long-Term Evolution. It is a combination of LTE and IMS technology which enables processing of digital packet voice service

More information

Business Considerations for Migration to IMT-2000

Business Considerations for Migration to IMT-2000 Business Considerations for Migration to IMT-2000 Bosco Eduardo Fernandes Siemens AG, ICM N PG SP NI IB Vice President International Affairs Email:bosco.fernandes@siemens.com ontent The Services Delivery

More information

VoLTE with OpenEPC and OpenIMS

VoLTE with OpenEPC and OpenIMS VoLTE with OpenEPC and OpenIMS Core Network Dynamics GmbH A German Engineering Software Company registered in Berlin www.corenetdynamics.com info@corenetdynamics.com www.openepc.com www.openimscore.com

More information

vepc-based Wireless Broadband Access

vepc-based Wireless Broadband Access With 70 years of experience, Iskratel is the leading European provider of infocommunications solutions and has, its own R&D and manufacturing centres, 900 employees and a local presence in more than 30

More information

Delivery of Voice and Text Messages over LTE

Delivery of Voice and Text Messages over LTE Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS 2. Third Party Voice over IP 3. The IP Multimedia Subsystem 4. Circuit Switched Fallback 5. VoLGA Two main approaches to the

More information

Impact of the LTE Migration for MVNOs

Impact of the LTE Migration for MVNOs Impact of the LTE Migration for MVNOs A Whitepaper Converting Diameter to SS7 protocols (CAMEL/SOAP/RADIUS/WIN/GSM MAP) and other proprietary protocols October 2012 By Dan Wonak Director of Marketing Abstract:

More information

Fixed Mobile Convergence

Fixed Mobile Convergence Fixed Mobile Convergence Daniel McHugh Solutions Manager dmchugh2@alcatel-lucent.com www.alcatel-lucent.com Fixed Mobile Convergence Fixed Mobile Convergence (FMC) provides common and seamless services

More information

Name of Course : E1-E2 CFA. Chapter 7A. Topic : SIP. Date of Creation :

Name of Course : E1-E2 CFA. Chapter 7A. Topic : SIP. Date of Creation : E1-E2(CFA)/SIP Rev Date 28.03.2011 Name of Course : E1-E2 CFA Chapter 7A Topic : SIP Date of Creation : 28.03.2011 For internal circulation of BSNL only Page 1 E1-E2(CFA)/SIP Rev Date 28.03.2011 Session

More information

BlackBerry Mobile Voice System

BlackBerry Mobile Voice System BlackBerry Mobile Voice System BlackBerry Mobile Voice System Mobile Unified Communications Mobile Voice System ( MVS) is designed to unify desk phone features on smartphones and Wi-Fi networks to optimize

More information

All-IP Core Network Multimedia Domain

All-IP Core Network Multimedia Domain 1 2 3 3GPP2 X.S0013-000-0 Version 1.0 Version Date: December, 2003 4 5 6 7 8 9 10 All-IP Core Multimedia Domain Overview 11 12 13 14 15 16 17 18 19 20 21 COPYRIGHT NOTICE 3GPP2 and its Organizational Partners

More information

Overview of the Juniper Networks Mobile Cloud Architecture

Overview of the Juniper Networks Mobile Cloud Architecture Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Competing with OTT Services: RCS e without IMS. November 15, 2011

Competing with OTT Services: RCS e without IMS. November 15, 2011 Competing with OTT Services: RCS e without IMS November 15, 2011 An Introduction to Interop All Gen Short Message Service Center (SMSC) 4 Series Message Personalization & Control (MPAC) Multimedia Message

More information

ETSI TS V7.0.0 ( ) Technical Specification

ETSI TS V7.0.0 ( ) Technical Specification TS 123 417 V7.0.0 (2007-12) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Telecommunications and Internet converged Services

More information

Cisco ASR 5500 Multimedia Core Platform

Cisco ASR 5500 Multimedia Core Platform Data Sheet Cisco ASR 5500 Multimedia Core Platform As a mobile operator, the mobile broadband network that you built has forever changed the way that your customers work, live, play, and learn, and has

More information

Charted Engineer, Fellow I.E.E. VP Standards & Fora Siemens Mobile Communications S.p.A. Italy. ITU-T SSG Vice Chairman

Charted Engineer, Fellow I.E.E. VP Standards & Fora Siemens Mobile Communications S.p.A. Italy. ITU-T SSG Vice Chairman Charted Engineer, Fellow I.E.E. VP Standards & Fora Siemens Mobile Communications S.p.A. Italy ITU-T SSG Vice Chairman 1 Contents What is happening in the mobile world? How should today s 2G investments

More information

TECHNOLOGY OPTIONS FOR EVOLUTION FROM EXISTING MOBILE SYSTEMS TO IMT-2000

TECHNOLOGY OPTIONS FOR EVOLUTION FROM EXISTING MOBILE SYSTEMS TO IMT-2000 TECHNOLOGY OPTIONS FOR EVOLUTION FROM EXISTING MOBILE SYSTEMS TO IMT-2000 Bosco Eduardo Fernandes Chair ICTG (IT-Media) and Manufacturers Sector Group UMTS Forum www.umts-forum.org Qatar 29 September 01

More information

ETSI ES V2.0.0 ( ) ETSI Standard

ETSI ES V2.0.0 ( ) ETSI Standard ES 282 007 V2.0.0 (2008-05) Standard Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); IP Multimedia Subsystem (IMS); Functional architecture 2 ES 282 007

More information

3GPP TS V7.0.0 ( )

3GPP TS V7.0.0 ( ) TS 23.417 V7.0.0 (2007-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Technical Specification Group Services and System Aspects; Telecommunications and Internet

More information

ETSI TC INT ACTIVITIES IN THE FIELD OF IMS STANDARDIZATION AND TESTING. Giulio Maggiore ETSI TC INT Chairman Martin Brand ETSI TC INT Vice Chairman

ETSI TC INT ACTIVITIES IN THE FIELD OF IMS STANDARDIZATION AND TESTING. Giulio Maggiore ETSI TC INT Chairman Martin Brand ETSI TC INT Vice Chairman ETSI TC INT ACTIVITIES IN THE FIELD OF IMS STANDARDIZATION AND TESTING Giulio Maggiore ETSI TC INT Chairman Martin Brand ETSI TC INT Vice Chairman Outline of presentation Core Network Testing 3GPP specs

More information

Implementing Cisco Service Provider Mobility LTE Networks ( )

Implementing Cisco Service Provider Mobility LTE Networks ( ) Implementing Cisco Service Provider Mobility LTE Networks (600-212) Exam Description: The Implementing Cisco LTE Packet Core Networks (600-212 SPLTE) exam is a 90- minute, 65 75 question assessment within

More information

WIT WebRTC Gateway. Real-time communications in all browsers. webrtc.wit-software.com

WIT WebRTC Gateway. Real-time communications in all browsers. webrtc.wit-software.com WIT WebRTC Gateway Real-time communications in all browsers webrtc.wit-software.com WebRTC Gateway WebRTC Gateway: Highlights Bridge Web and SIP/IMS World. Hybrid Architecture (HTML5+WebRTC+Flash). Solve

More information

Transformation of business communications

Transformation of business communications Mobilizing Real Time Communications Transformation of business communications The adoption of IP underlies the intersection of Real Time Communications between mobile and fixed carriers and today s connected

More information

NG40 IMS Emulator. Key features: IMS Registration VoLTE Basic SRVCC (one-way HO of single active speech session from 4G PS to 3G CS)

NG40 IMS Emulator. Key features: IMS Registration VoLTE Basic SRVCC (one-way HO of single active speech session from 4G PS to 3G CS) NG40 IMS Emulator IMS Emulation for LTE has been added to the ng4t portfolio. The NG40 IMS Emulator is an extension to the NG40 eutran and to the NG40 EPC Emulator. The NG40 eutran Emulator simulates the

More information

Vishal Shirodkar Technology Specialist Microsoft India Session Code:

Vishal Shirodkar Technology Specialist Microsoft India Session Code: Vishal Shirodkar Technology Specialist Microsoft India Session Code: Session Objectives And Takeaways Explain how DirectAccess differs from a traditional VPN Identify some of the key requirements for installing

More information

Status of IMS-Based Next Generation Networks for Fixed Mobile Convergence

Status of IMS-Based Next Generation Networks for Fixed Mobile Convergence Status of IMS-Based Next Generation Networks for Fixed Mobile Convergence Prepared for: WOCC 2007 Fuchun Joseph Lin Chief Scientist fjlin@research.telcordia.com Telcordia Technologies, Inc. April 28, 2007

More information

Dialogic PowerMedia Media Resource Broker (MRB)

Dialogic PowerMedia Media Resource Broker (MRB) Dialogic PowerMedia Media Resource Broker (MRB) The PowerMedia Media Resource Broker (MRB), a standardscompliant, software-based Media Resource Broker that allows application developers, service providers

More information

Diameter, Meet Your Future

Diameter, Meet Your Future , Meet Your Future The Dialogic Helix The Helix (HSC) raises the bar for functionality by combining unparalleled multiprotocol Interworking Functionality (IWF) and high-availability Edge Agent (DEA) and

More information

NTG Wifi-Calling Client. Proudly Canadian

NTG Wifi-Calling Client. Proudly Canadian Proudly Canadian Content NTG Overview Wifi-Calling Service Why Wifi-Calling Challenges for Wifi-Calling NTG VoWifi Client 2 Company Overview Telecom and IT infrastructure solutions provider, established

More information

CDG Technology Forum Inter-Technology Networking

CDG Technology Forum Inter-Technology Networking CDG Technology Forum Inter-Technology Networking The Impact of 4G on the Packet Core Network April 30, 2008 Gennady Sirota Vice President, Product Management Safe Harbor Statement This presentation contains

More information

Technical Overview. Mitel MiCloud Telepo for Service Providers 4.0. Key Features

Technical Overview. Mitel MiCloud Telepo for Service Providers 4.0. Key Features Technical Overview Mitel MiCloud Telepo for Service Providers 4.0 Key Features For the enterprise market Enable service providers to offer advanced business communication A complete, open and pure software

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

VOLTE and the IP/MPLS Cell Site Evolution

VOLTE and the IP/MPLS Cell Site Evolution AVIAT NETWORKS VOLTE and the IP/MPLS Cell Site Evolution By Eduardo J. Sánchez, Aviat Networks Technical Marketing TABLE OF CONTENTS INTRODUCTION...3 PROBLEM: DEPLOYING VOLTE FOR RELIABLE VOICE AND VIDEO...3

More information

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple APPGATE TECHNOLOGY UNIFIED TECHNOLOGY Introduction The AppGate solution truly delivers holistic security and access control where other approaches fall short. It is designed to address the security and

More information

IMS and Media Control. James Rafferty, Cantata Technology August 10, 2007

IMS and Media Control. James Rafferty, Cantata Technology August 10, 2007 IMS and Media Control James Rafferty, Cantata Technology August 10, 2007 IMS and Media Control IMS and Media Control Relationship to Overall IMS Media Resource Function Prior Art Relationship to Application

More information

Never Drop a Call With TecInfo SIP Proxy White Paper

Never Drop a Call With TecInfo SIP Proxy White Paper Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video

More information

Diameter Routing. Use Case Guide

Diameter Routing. Use Case Guide Diameter Routing Use Case Guide Diameter Routing Use Case Guide Table Of Contents Introduction...1 Sonus Diameter Signaling Controller Overview...1 Centralized Routing...2 Deployment of Multiple s in Either

More information

Innovation Technology for Future Convergence Network

Innovation Technology for Future Convergence Network KRnet 2013 Keynote Speech Innovation Technology for Future Convergence Network Jinsung Choi, Ph.D. EVP, Head of ICT R&D Division, SK Telecom Contents I. Key Trends Driving Network Evolution II. Innovation

More information

IPv6 in Mobile Networks and IMS Ericsson NEA Toshikane Oda

IPv6 in Mobile Networks and IMS Ericsson NEA Toshikane Oda IPv6 in Mobile Networks and IMS 2009-02-25 Ericsson NEA Toshikane Oda Outline 1. Growth of Mobile Broadband Markets 2. Evolution of Mobile Packet System 3. IMS for Converged IP Multimedia Services 4. EU

More information

Dialogic PowerMedia Media Resource Broker (MRB)

Dialogic PowerMedia Media Resource Broker (MRB) Dialogic PowerMedia Media Resource Broker (MRB) The PowerMedia Media Resource Broker (MRB) is a standardscompliant, software-based Media Resource Broker that allows application developers, service providers

More information

IP Multimedia Subsystem Application Servers

IP Multimedia Subsystem Application Servers IP Multimedia Subsystem Application Servers Second part of the project Presented by: Masood Khosroshahy B E G I N N I N G 1 June 2006 Project supervisor: Prof. Elie Najm IMS Application Servers HSS IMS

More information

Cisco Unified Presence 8.0

Cisco Unified Presence 8.0 Cisco Unified Presence 8.0 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time from any workspace.

More information

Measuring the Explosion of LTE Signaling Traffic - A Diameter Traffic Model

Measuring the Explosion of LTE Signaling Traffic - A Diameter Traffic Model Measuring the Explosion of LTE Signaling Traffic - A Diameter Traffic Model A Whitepaper September 2012 By Chris Knight Solution Engineering Abstract: Many of us in the industry have been talking for some

More information

Improvement of VoLTE Domain HO with Operators Vision

Improvement of VoLTE Domain HO with Operators Vision TS-A3 (Technical Session): Mobile Access and Network - #4 Improvement of VoLTE Domain HO with Operators Vision NW Strategy Group, Global Standardization Team Network Development Department NTT DOCOMO R&D

More information

NetNumber Private LTE

NetNumber Private LTE NetNumber Private LTE A NETNUMBER WHITE PAPER Page 1 Scalable and Flexible Private LTE Network Solutions This whitepaper will review the advantages Private LTE brings to the enterprise, example enterprise

More information

Delivering the Wireless Software-Defined Branch

Delivering the Wireless Software-Defined Branch Delivering the Wireless Software-Defined Branch By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Cradlepoint Executive Summary Operations at the branch, critical to many distributed organizations,

More information

Cisco Unified Communications Manager 9.0

Cisco Unified Communications Manager 9.0 Data Sheet Cisco Unified Communications Manager 9.0 Cisco Unified Communications Manager is the heart of Cisco collaboration services, enabling session and call control for video, voice, messaging, mobility,

More information

Push-to-Revenue: Maximizing Potential Beyond Basic Push-to-Talk. David Wetherelt, Director International Carrier Sales

Push-to-Revenue: Maximizing Potential Beyond Basic Push-to-Talk. David Wetherelt, Director International Carrier Sales Push-to-Revenue: Maximizing Potential Beyond Basic Push-to-Talk David Wetherelt, Director International Carrier Sales Push-to-Talk: The Application Driving Today s Market The First Killer Application For

More information

The Journey to Virtualization & Transformation in the Core Network

The Journey to Virtualization & Transformation in the Core Network The Journey to Virtualization & Transformation in the Core Network Kevin Peters President & CEO, NetNumber 2018 TM Forum 1 NetNumber Overview FOUNDED Boston, 2000 GLOBAL PRESENCE 175 employees 170+ customers,

More information

Enabling FMC: Airvana Universal Access Gateway

Enabling FMC: Airvana Universal Access Gateway Enabling FMC: Airvana Universal Access Gateway 2006 3G CDMA Latin America Regional Conference May 25 th, 2006 Sao Paulo, Brazil Michael McFarland Director, Marketing & Business Development Airvana, Inc

More information

Spirent Landslide VoLTE

Spirent Landslide VoLTE /IMS Node and SIP UE Emulation Voice over LTE () is the combination of IMS-based voice, messaging and video services over the 4G mobile network. To ensure a successful transition, mobile carriers and equipment

More information

Diameter Load-Testing Solution

Diameter Load-Testing Solution High Performance and Capacity Diameter Load-Testing Solution Easy-to-use, high-performance and high-capacity regression, conformance and Diameter load-testing solution enabling Diameter device testing

More information

Total Threat Protection. Whitepaper

Total Threat Protection. Whitepaper Total Threat Protection Whitepaper Organizations Are Caught Between a Growing Threat Landscape and Resource Limitations Today s organizations continue to struggle with providing adequate protection in

More information

Lowering Network TCO with a Virtualized Core. Mavenir vepc S O L U T I O N B R I E F

Lowering Network TCO with a Virtualized Core. Mavenir vepc S O L U T I O N B R I E F S O L U T I O N B R I E F Mavenir vepc Lowering Network TCO with a Virtualized Core Mavenir vepc Mobile operators are competing to add capacity and services quickly, yet are finding that their traditional

More information

THETARAY ANOMALY DETECTION

THETARAY ANOMALY DETECTION NEPTUNE 0100110001101111011100100110010101101101001000000110100101110 0000111001101110101011011010010000001100100011011110110110001 1011110111001000100000011100110110100101110100001000000110000 1011011010110010101110100001011000010000001100011011011110110

More information

ETSI TS V ( )

ETSI TS V ( ) TS 124 523 V12.2.0 (2015-01) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; Core and enterprise Next Generation Network (NGN) interaction scenarios; Architecture and functional

More information

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all

More information

Nairobi (Kenya), 9-12 May 2005 Session 1.2 "International Framework"

Nairobi (Kenya), 9-12 May 2005 Session 1.2 International Framework Regional Seminar for Africa on Fixed Mobile Convergence and Guidelines on the smooth transition of existing mobile networks to IMT-2000 for Developing Countries Nairobi (Kenya), 9-12 May 2005 Session 1.2

More information

MSF Architecture for 3GPP Evolved Packet System (EPS) Access MSF-LTE-ARCH-EPS-002.FINAL

MSF Architecture for 3GPP Evolved Packet System (EPS) Access MSF-LTE-ARCH-EPS-002.FINAL MSF Architecture for 3GPP Evolved Packet System (EPS) Access MSF-LTE-ARCH-EPS-002.FINAL MultiService Forum Architecture Agreement Contribution Number: Document Filename: Working Group: Title: Editor: Contact

More information

FLEXIBLE NETWORK SERVICES TO DRIVE YOUR ENTERPRISE AT CLOUD SPEED. Solution Primer

FLEXIBLE NETWORK SERVICES TO DRIVE YOUR ENTERPRISE AT CLOUD SPEED. Solution Primer FLEXIBLE NETWORK SERVICES TO DRIVE YOUR ENTERPRISE AT CLOUD SPEED Solution Primer ABSTRACT Software Defined Networking (SDN) has delivered significant benefits to datacenter networks, making it possible

More information

Chapter 3: IP Multimedia Subsystems and Application-Level Signaling

Chapter 3: IP Multimedia Subsystems and Application-Level Signaling Chapter 3: IP Multimedia Subsystems and Application-Level Signaling Jyh-Cheng Chen and Tao Zhang IP-Based Next-Generation Wireless Networks Published by John Wiley & Sons, Inc. January 2004 Outline 3.1

More information

3GPP TS V8.0.0 ( )

3GPP TS V8.0.0 ( ) TS 23.517 V8.0.0 (2007-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Technical Specification Group Services and System Aspects; Protocols for Advanced Networking

More information

6 KEY SECURITY REQUIREMENTS

6 KEY SECURITY REQUIREMENTS KEY SECURITY REQUIREMENTS for Next Generation Mobile Networks A Prevention-Oriented Approach to in Evolving Mobile Network Ecosystems A Prevention-Oriented Approach to in Evolving Mobile Network Ecosystems

More information

ORACLE ENTERPRISE COMMUNICATIONS BROKER

ORACLE ENTERPRISE COMMUNICATIONS BROKER ORACLE ENTERPRISE COMMUNICATIONS BROKER A CORE COMMUNICATIONS CONTROLLER KEY FEATURES Centralized dial plan management Centralized session routing and forking Multivendor UC protocol normalization SIP

More information

The IP Multimedia Subsystem (IMS)

The IP Multimedia Subsystem (IMS) The IP Multimedia Subsystem (IMS) Miguel A. Garcia Martin Nokia Siemens Networks Application and Services in Internet Helsinki University of Technology October 24, 2007 1 Nokia Siemens Networks IMS / Miguel

More information

IP Multimedia Subsystem(IMS) and Its Applications

IP Multimedia Subsystem(IMS) and Its Applications KNOM Conference April 26 ~ 27 2007 IP Multimedia Subsystem(IMS) and Its Applications 2007. 4. 26 Jun-Won Lee 1 Contents IMS Overview IMS Architecture Contents IMS Applications IMS Enablers & Clients 2

More information

The office for the anywhere worker!!! Your LCB SOFTPHONE: A powerful new take on the all-in-one for a more immersive experience.

The office for the anywhere worker!!! Your LCB SOFTPHONE: A powerful new take on the all-in-one for a more immersive experience. The office for the anywhere worker!!! Your LCB SOFTPHONE: A powerful new take on the all-in-one for a more immersive experience. LCB SOFTPHONE FOR SALESFORCE Combine real-time communications and tracking

More information

Agenda. Introduction Roaming Scenarios. Other considerations. Data SMS Voice IMS

Agenda. Introduction Roaming Scenarios. Other considerations. Data SMS Voice IMS LTE Roaming Agenda Introduction Roaming Scenarios Data SMS Voice IMS Other considerations LTE Roaming Situation None of Verizon LTE subscribers can roam on another LTE network, not even on other 700 MHz

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

vims System and Products Training Programs Catalog of Course Descriptions

vims System and Products Training Programs Catalog of Course Descriptions vims 1 2018 System and Products Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...4 CSCF 17 OPERATION AND CONFIGURATION...5 HSS-FE 1 OPERATION AND CONFIGURATION

More information

Level 1 Technical Firewall Traversal & Security. Level 1 Technical. Firewall Traversal & Security. V2 Page 1 of 16

Level 1 Technical Firewall Traversal & Security. Level 1 Technical. Firewall Traversal & Security. V2 Page 1 of 16 Level 1 Technical Firewall Traversal & Security V2 Page 1 of 16 Contents 1 - Introduction... 3 Introduction... Error! Bookmark not defined. Available Resources... 8 2 - Overview... 4 Level 1 Recap... Error!

More information